ASA Version 9.x SSH and Telnet on the Inside and Outside Interfaces Configuration Example
PDF View with Adobe Reader on a variety of devices
ePub View in various apps on iPhone, iPad, Android, Sony Reader, or Windows Phone
Mobi (Kindle) View on Kindle device or Kindle app on multiple devices
Updated:August 13, 2014
SSH Access to the Security Appliance
ASDM Version 7.2.1 Configuration
Telnet Example Scenarios
View Active SSH Sessions
View Public RSA Keys
Remove the RSA Keys from the ASA
SSH Connection Failed
This document describes how to configure Secure Shell (SSH) on the inside and outside interfaces of the Cisco Series Security Appliance Versions 9.x and later. When you must configure and monitor the Cisco Adaptive Security Appliance (ASA) remotely with the CLI, the use of either Telnet or SSH is required. Because Telnet communications are sent in clear text, which can include passwords, SSH is highly recommended. The SSH traffic is encrypted in a tunnel and thereby helps protect passwords and other sensitive configuration commands from interception.
The ASA allows SSH connections to the security appliance for management purposes. The security appliance allows a maximum of five concurrent SSH connections for each security context, if available, and a global maximum of 100 connections for all of the contexts combined.